Journal: Des. Codes Cryptography

Volume 76, Issue 3

373 -- 384Masaaki Harada. On a 5-design related to a putative extremal doubly even self-dual code of length a multiple of 24
385 -- 408Guo-qiang Liu, Chen-Hui Jin. Differential cryptanalysis of PRESENT-like cipher
409 -- 430Bangteng Xu. Bentness and nonlinearity of functions on finite groups
431 -- 449Orr Dunkelman, Nathan Keller, Adi Shamir. Almost universal forgery attacks on AES-based MAC's
451 -- 468Susan G. Barwick, Wen-Ai Jackson. 3)
469 -- 504Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama. Strongly secure authenticated key exchange from factoring, codes, and lattices
505 -- 517Tung Le, Jamshid Moori. On the automorphisms of designs constructed from finite simple groups
519 -- 535Steven T. Dougherty, Jon-Lark Kim, Yoonjin Lee. Codes over rings and Hermitian lattices
537 -- 549Oktay Olmez. Plateaued functions and one-and-half difference sets
551 -- 569Anthony B. Evans, David Fear, Rebecca J. Stones. Diagonally cyclic equitable rectangles
571 -- 587Claude Carlet, Deng Tang. Enhanced Boolean functions suitable for the filter model of pseudo-random generator
589 -- 600Hengjia Wei, Hui Zhang 0004, Gennian Ge. Completely reducible super-simple designs with block size five and index two
601 -- 627Orr Dunkelman, Nathan Keller. Practical-time attacks against reduced variants of MISTY1

Volume 76, Issue 2

135 -- 171Mauro Biliotti, Alessandro Montinaro, Eliana Francot. 2-(v, k, 1) Designs with a point-primitive rank 3 automorphism group of affine type
173 -- 178Ferruh Özbudak, Seher Tutdere, Oguz Yayla. On some bounds on the minimum distance of cyclic codes over finite fields
179 -- 205Jooyoung Lee, Martijn Stam. MJH: a faster alternative to MDC-2
207 -- 216Tamás Héger, Balázs Patkós, Marcella Takáts. Search problems in vector spaces
217 -- 235T. Shaska, C. Shor. Theta functions and symmetric weight enumerators for codes over imaginary quadratic fields
237 -- 256Darcy Best, Hadi Kharaghani, Hugh Ramp. Mutually unbiased weighing matrices
257 -- 267Edward Dobson. Monomial isomorphisms of cyclic codes
269 -- 277José Joaquín Bernal, Joaquim Borges, Cristina Fernández-Córdoba, Mercè Villanueva. 4-linear codes
279 -- 305Jiao Li, Claude Carlet, Xiangyong Zeng, Chunlei Li, Lei Hu, Jinyong Shan. Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks
307 -- 323Eric Zhi Chen. A new iterative computer search algorithm for good quasi-twisted codes
325 -- 344Thomas Plantard, Willy Susilo, Zhenfei Zhang. LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme
345 -- 360Sihuang Hu, Shuxing Li, Tao Zhang, Tao Feng, Gennian Ge. New pseudo-planar binomials in characteristic two and related schemes
361 -- 372Yuan-Hsun Lo, Hung-Lin Fu, Yi-Hean Lin. Weighted maximum matchings and optimal equi-difference conflict-avoiding codes

Volume 76, Issue 1

1 -- 2Ilias S. Kotsireas, Edgar Martínez-Moro. Foreword: Computer Algebra in Coding Theory and Cryptography
3 -- 21Mercè Villanueva, Fanxuan Zeng, Jaume Pujol. Efficient representation of binary nonlinear codes: constructions and minimum distance computation
23 -- 35Natalia Dück, Karl-Heinz Zimmermann. Heuristic decoding of linear codes using commutative algebra
37 -- 47Tom Høholdt, Fernando Piñero, Peng Zeng. Optimal codes as Tanner codes with cyclic component codes
49 -- 79Olav Geil, Stefano Martin. An improvement of the Feng-Rao bound for primary codes
81 -- 87Wilson Olaya-León, Claudia Granados-Pinzón. The second generalized Hamming weight of certain Castle codes
89 -- 100Carlos Galindo, Fernando Hernando. Quantum codes from affine variety codes and their subfield-subcodes
101 -- 111Carlos Munuera. Hamming codes for wet paper steganography
113 -- 133Thomas W. Cusick, Bryan Johns. Theory of 2-rotation symmetric cubic Boolean functions